While traditional perimeter based security models have served Enterprises well in the past, they are increasingly losing their effectiveness when applied to modern workloads and topologies. As applications shift out of the data center and into the cloud, and employees, partners, and contractors shift from dedicated offices to remote access in homes and coffee houses, the perimeter itself is dissolving. Traditional VPNs are being stretched beyond their initial purpose to desperately try to hold together the remnants of an increasingly obsolete network architecture. And no one knows that better than the threat actors who are exploiting weaknesses in traditional security perimeters that simply weren’t designed for this.

In this talk, we will cover:

Why the traditional network perimeter is the enemy of diverse virtual workloads and roaming users.

How attempting to tie modern workloads to perimeter security actually breaks not only security, but performance.

What the Zero Trust model is, and why it is key to securing access to your network.

How Zero Trust provides both security while removing the traditional performance hurdles.

How Google’s BeyondCorp and Akamai’s Cloud Perimeter are evolving Enterprise Security and Access to meet those needs.

About the Presenter

Charlie Gero

Charlie Gero has worked in security, networking, and the software engineering fields for 20 years, with a decade spent at Akamai. Prior to Akamai, Charlie was an entrepreneur and served in key computer science positions within the pharmaceutical and networking industries. Currently the CTO of the Enterprise Division, Charlie has also served as lead of the advanced R&D group at Akamai and holds many patents in the areas of cryptography, distributed systems, compression, and more. Charlie brings a wealth of deep technical experience in security and networks and has degrees in Physics and Computer Science from Moravian College.

More Tech Talks

September 19, 2017

While traditional perimeter based security models have served Enterprises well in the past, they are increasingly losing their effectiveness when applied to modern workloads and topologies. As applications shift out of the data center and into the cloud, and employees, partners, and contractors shift from dedicated offices to remote access in homes and coffee houses, the perimeter itself is dissolving. Traditional VPNs are being stretched beyond their initial purpose to desperately try to hold together the remnants of an increasingly obsolete network architecture. And no one knows that better than the threat actors who are exploiting weaknesses in traditional security perimeters that simply weren’t designed for this.

August 22, 2017

Holiday season accounts for 20 percent of the retail industry's annual sales and it is often responsible for up to 30 percent of some individual retailer's total annual sales. As the stakes are extremely high during such a short period of time, you can't afford to let customers down with bad experiences and miss out on their business.

August 8, 2017

Our emotional brain is highly tuned for making decisions based on the subtleness of features. What we see with our eyes is highly processed by our brains and subconsciously impacts how consumers buy products, or interact with brands.